Understanding Identity and Access Management
CompTIA Security+ objectives covered in this chapter:
2.4 Summarize authentication and authorization design concepts. Authentication methods (Federation) Technologies (Time-based one- time password (TOTP), HMAC-based one-time password (HOTP), Short message service (SMS), Token key, Static codes, Authentication applications, Push notifications, Phone call), Smart card authentication Biometrics (Fingerprint, Retina, Iris, Facial, Voice, Vein, Gait analysis, Efficacy rates, False acceptance, False rejection, Crossover error rate) Multifactor authentication (MFA) factors and attributes Factors (Something you know, Something you have, Something you are), Attributes (Somewhere you are, Something you can do, Something you exhibit, Someone you know) Authentication, authorization, and accounting (AAA)
2.8 Summarize the basics of cryptographic concepts. Common use cases (Supporting authentication)
3.7 Given a scenario, implement identity and account management controls. Identity (Identity provider (IdP), Attributes, Certificates, Tokens, SSH keys, Smart cards) Account types (User account, Shared and generic accounts/credentials, Guest accounts, Service accounts) Account policies (Password complexity, Password history, Password reuse, Network location, Geolocation, Time-based logins, Access policies, Account permissions, Account audits, Impossible travel time/risky login, Lockout, Disablement) 3.8 Given a scenario, implement authentication and authorization solutions. Authentication management (Password keys, Password vaults, Knowledge-based authentication) Authentication/authorization (Single sign-on (SSO), Security Assertion Markup Language (SAML), OAuth, OpenID, Kerberos) Access control schemes (Attribute-based access control (ABAC), Role-based access control, Rule-based access control, MAC, Discretionary access control (DAC), Conditional access, Privileged access management, Filesystem permissions) 4.3 Given an incident, utilize appropriate data sources to support an investigation. Log files (Authentication)
5.3 Explain the importance of policies to organizational security. Credential policies (Personnel, Third party, Devices, Service accounts, Administrator/root accounts)
** Identity and access management includes many important concepts that are tested on the CompTIA Security+ exam. Users claim an identity with a username and prove their identity by authenticating (such as with a password). They are then granted access to resources based on their proven identity. In this chapter, you’ll learn about various authentication concepts and methods, along with some basic security principles used to manage accounts. This chapter closes with a comparison of some access control schemes.
Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 222-224). YCDA, LLC. Kindle Edition.